TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Abusing Ubuntu 24.04 features for root privilege escalation

189 pointsby saltypal7 months ago

7 comments

samlinnfer7 months ago
24.04 also ships with a footgun that keeps PasswordAuthentication enabled even if you edit &#x2F;etc&#x2F;ssh&#x2F;sshd_config. It adds a &#x2F;etc&#x2F;ssh&#x2F;sshd_config.d&#x2F;50-cloud-init.conf that force overrides any PasswordAuthentication settings you have configured in &#x2F;etc&#x2F;ssh&#x2F;sshd_config.<p>See here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=42133181">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=42133181</a>
评论 #42137356 未加载
评论 #42136935 未加载
评论 #42138026 未加载
评论 #42141291 未加载
评论 #42135901 未加载
评论 #42137430 未加载
评论 #42157981 未加载
评论 #42143739 未加载
BonusPlay7 months ago
Linux Local Privilege Escalation, but the attacker has to be in sudo group in the first place.<p>Great read, but this feels like academic research. Technically correct, but impractical at best.
评论 #42134683 未加载
评论 #42134479 未加载
评论 #42135744 未加载
fred_is_fred7 months ago
That was a great read. The way the author builds the exploit, brick by brick, is well done and not all all obvious or clear. Each step by itself is somewhat concerning but there&#x27;s no Eureka! moment until very late.
schoen7 months ago
I wonder if there&#x27;s a tool to create dependency graphs for these dbus and polkit interactions, ideally to better audit those that seem to cross interesting trust boundaries.
trod12347 months ago
Not surprising, Ubuntu has suffered a wide array of issues going all the way back to their releases following 18.04 LTS.<p>D-BUS has long been targeted by attackers for the exact reasons the author goes into (its fairly common knowledge in some circles). Not just because of the difference in security contexts but also because of the lack of visibility on these channels with OOB configurations for logging&#x2F;monitoring.<p>D-BUS Activation has also been targeted before, many times for its ability to effectively re-parent a process under different pids&#x2F;names&#x2F;users, and hiding that process is usually not that hard using a simple mount bind on the associated &#x2F;proc&#x2F;pid and mounts directory post exploitation.<p>With the poisoning of the Ubuntu repository (with fixup scripts to re-enable snap), their security posture became untenable, but has only gotten worse over time.
sheerun7 months ago
The only feedback I get when installing d-spy is &quot;Uses System Services&quot;, and &quot;Uses Session Services&quot;, which means nothing to me as a user, and yet it allows program to enumerate all programs I use and as it turns out even hack my computer. Other platforms solved this with something like &quot;developer mode&quot;, iOS, Android, Meta, etc. I shouldn&#x27;t be able to install this app without confirming developer-mode-only permissions. As for this particular app it is offline, yes, but dbus allows for cross-app communication, so no more
评论 #42136238 未加载
sylware7 months ago
It is time to stop that: there is no &quot;security&quot;, this is a fantasy which does not exist. Nowadays, anybody saying otherwise is trying to sell you something.<p>The only real security is to protect basic users from themselves, namely breaking their systems. That&#x27;s it. (rm -Rf &#x2F;)